SlideShare a Scribd company logo
1 of 13
Download to read offline
IPLOG?
A beginner's IDS for the WIN!v0.2
IPLOG, provides the beginner
sysadmin with actionable
network intelligence, without the
complexities of more advanced
IDS solutions.
The purpose of an IDS.
Actionable & Timely Intelligence.
● Open Source Solutions
– Suricata
– TcpDump / Wireshark
– SNORT
– IPLOG
The Problems
● Suricata.
– It exists, that's all I know about it.
– If you know more about it, be ready for the Q & A!
– Next point. :-)
● TcpDump / Wireshark.
– Skills
● Can you read a pcap like a book?
● Can you dissect TCP/IP in your head?
● We are at a BSides, maybe some of you can.
– Speed
● Can you do all the above at 10 MB/s?
● Actionable? Yes. Timely? No.
The Problems Contd
SNORT Complexity
● IDS - SNORT has LOTS of options.
● Rule Management.
– Which set or sets?
● Community.
● ET.
● VRT.
● Custom.
– Which update solution?
● Oinkmaster.
● Pulled Pork.
The Problems Contd
SNORT Complexity Contd
● Logs - Here comes LOTS of DATA!
– Which DB?
● Mysql.
● Postgresql.
– SNORT -> DB interface? - Barnyard2
● A Web APP
– Web Server Deployment.
– Web App Deployment.
– Some Web Apps.
● BASE
● Snorby
● Sguil
The Problems Contd
SNORT Contd
● Skills
– Learn everything just mentioned.
– Tune your rule sets to eliminate the noise.
● Speed.
– Actionable? Yes.
– Timely? Yes.
● After your rule set is tuned.
● After you get current on the logs. :-)
A solution, IPLOG.
What is IPLOG?
● Open Source Software.
● Written by Ryan McCabe in 2000.
● github.com/NathanGibbs3/iplog
● Simple, but not tcpdump.
IPLOG
What does it do.
● Connection Logging
● Scan Detection
– TCP Port Scans.
– TCP SYN Scans.
– TCP null Scans.
– FIN Scans.
– TCP "Xmas" Scans.
– UDP Scans.
● Attack Detection
– ICMP ping floods.
– UDP and ICMP
"smurf" attacks.
– IP fragment attacks.
– Bogus TCP flags.
● NMAP Scan evasion.
( Experimental )
IPLOG
Logging
● Syslog or text file
● Log Sample
Jan 1 00:26:25 TCP: Bogus TCP flags set by 157.55.33.14:28256 (dest port 80)
Jan 1 02:24:03 UDP: scan/flood detected [port 500] from 124.126.133.120 [port 500]
Jan 1 02:24:10 ICMP: 194.187.150.110 time exceeded (udp: dest port 32887, source port 51413)
Jan 1 02:24:44 ICMP: 196.200.48.10 time exceeded (tcp: dest port 63473, source port 47785)
Jan 1 02:24:45 ICMP: 196.200.48.10 time exceeded (tcp: dest port 63473, source port 44733)
Jan 1 02:25:09 UDP: scan/flood mode expired for 124.126.133.120 - received a total of 36 packets
(14616 bytes).
Jan 1 02:26:18 ICMP: echo from 129.82.138.44 (12 bytes)
Jan 1 02:26:26 ICMP: 194.187.150.110 time exceeded (udp: dest port 51731, source port 51413)
Jan 1 02:29:15 last message repeated 1 times
Jan 1 02:29:15 TCP: ms-sql-s connection attempt from 115.239.226.51:6000
Jan 1 02:30:26 UDP: dgram to isakmp from 124.126.133.120:500 (412 data bytes)
Jan 1 02:30:26 UDP: dgram to isakmp from 124.126.133.120:500 (384 data bytes)
IPLOG
Misc.
● Can filter out noise.
– Config Example.
# gtld Name Servers
ignore udp from 192.5.6.30 sport 53
ignore udp from 192.12.94.30 sport 53
ignore udp from 192.26.92.30 sport 53
ignore udp from 192.31.80.30 sport 53
ignore udp from 192.33.14.30 sport 53
ignore udp from 192.35.51.30 sport 53
● A newer version of IPLOG. ( 2.2.5 )
github.com/NathanGibbs3/iplog
Contact Information.
● Email: nathan@cmpublishers.com
● Twitter: @Christ_Media
● Linkedin: linkedin.com/in/nategibbs
● Slideshare: slideshare.net/NathanGibbs3
● GitHub: github.com/NathanGibbs3
● Web Site: www.cmpublishers.com/oss
Thank You!
● Jesus Christ.
● Family & Friends.
● BSides ROC.
● Ryan McCabe.
Q & A
?

More Related Content

What's hot (18)

Nmap
NmapNmap
Nmap
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Nmap commands
Nmap commandsNmap commands
Nmap commands
 
N map presentation
N map presentationN map presentation
N map presentation
 
NMAP by Shrikant Antre & Shobhit Gautam
NMAP by Shrikant Antre & Shobhit GautamNMAP by Shrikant Antre & Shobhit Gautam
NMAP by Shrikant Antre & Shobhit Gautam
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
 
Nmap
NmapNmap
Nmap
 
Nmap
NmapNmap
Nmap
 
Nmap Hacking Guide
Nmap Hacking GuideNmap Hacking Guide
Nmap Hacking Guide
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Network scanning with nmap
Network scanning with nmapNetwork scanning with nmap
Network scanning with nmap
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
TCPdump-Wireshark
TCPdump-WiresharkTCPdump-Wireshark
TCPdump-Wireshark
 
Netcat
NetcatNetcat
Netcat
 
Nmap scripting engine
Nmap scripting engineNmap scripting engine
Nmap scripting engine
 
Nmap
NmapNmap
Nmap
 

Viewers also liked

Презентація ІГСУ
Презентація ІГСУПрезентація ІГСУ
Презентація ІГСУAndrew Androshchuk
 
Особенности нормирования офисных работников
Особенности нормирования офисных работниковОсобенности нормирования офисных работников
Особенности нормирования офисных работниковHRedu.ru
 
Oregano deshidratado. Ficha técnica
Oregano deshidratado. Ficha técnicaOregano deshidratado. Ficha técnica
Oregano deshidratado. Ficha técnicaMundiTrades
 
СУЗ как основа корпоративнои культуры организации
СУЗ как основа корпоративнои  культуры организацииСУЗ как основа корпоративнои  культуры организации
СУЗ как основа корпоративнои культуры организацииHRedu.ru
 
Cadena de café de la Amazonía Ecuatoriana
Cadena de café de la Amazonía EcuatorianaCadena de café de la Amazonía Ecuatoriana
Cadena de café de la Amazonía EcuatorianaCIAT
 
HESS Acadia in-ground up-lighter
HESS Acadia in-ground up-lighterHESS Acadia in-ground up-lighter
HESS Acadia in-ground up-lighterWalter Wendel
 

Viewers also liked (10)

Презентація ІГСУ
Презентація ІГСУПрезентація ІГСУ
Презентація ІГСУ
 
Curcuma
CurcumaCurcuma
Curcuma
 
Slideshare
SlideshareSlideshare
Slideshare
 
Especies emblematicas del peru
Especies emblematicas del peruEspecies emblematicas del peru
Especies emblematicas del peru
 
Особенности нормирования офисных работников
Особенности нормирования офисных работниковОсобенности нормирования офисных работников
Особенности нормирования офисных работников
 
Oregano deshidratado. Ficha técnica
Oregano deshidratado. Ficha técnicaOregano deshidratado. Ficha técnica
Oregano deshidratado. Ficha técnica
 
СУЗ как основа корпоративнои культуры организации
СУЗ как основа корпоративнои  культуры организацииСУЗ как основа корпоративнои  культуры организации
СУЗ как основа корпоративнои культуры организации
 
Cadena de café de la Amazonía Ecuatoriana
Cadena de café de la Amazonía EcuatorianaCadena de café de la Amazonía Ecuatoriana
Cadena de café de la Amazonía Ecuatoriana
 
HESS Acadia in-ground up-lighter
HESS Acadia in-ground up-lighterHESS Acadia in-ground up-lighter
HESS Acadia in-ground up-lighter
 
Product Management
Product ManagementProduct Management
Product Management
 

Similar to IPLOG-BSidesROC-2015

IPLOG-BSides-DE-2014
IPLOG-BSides-DE-2014IPLOG-BSides-DE-2014
IPLOG-BSides-DE-2014Leo Jotib
 
How to dominate a country
How to dominate a countryHow to dominate a country
How to dominate a countryTiago Henriques
 
PLNOG16: Obsługa 100M pps na platformie PC , Przemysław Frasunek, Paweł Mała...
PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...
PLNOG16: Obsługa 100M pps na platformie PC , Przemysław Frasunek, Paweł Mała...PROIDEA
 
DPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDSDPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDSVipin Varghese
 
Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)Andriy Berestovskyy
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDKKernel TLV
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-IManageEngine
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...PROIDEA
 
SMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgiSMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgiTakuya ASADA
 
How Secure is TCP/IP - A review of Network Protocol
How Secure is TCP/IP - A review of Network ProtocolHow Secure is TCP/IP - A review of Network Protocol
How Secure is TCP/IP - A review of Network Protocolssuserc49ec4
 
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018DevOpsDays Tel Aviv
 
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageMaster Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageChris Sistrunk
 
Rip 2 docoments version 1.1 by deepak kumar
Rip 2 docoments version 1.1 by deepak kumarRip 2 docoments version 1.1 by deepak kumar
Rip 2 docoments version 1.1 by deepak kumarDeepak Kumar
 
Get rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protectionGet rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protectionPawel Krawczyk
 

Similar to IPLOG-BSidesROC-2015 (20)

IPLOG-BSides-DE-2014
IPLOG-BSides-DE-2014IPLOG-BSides-DE-2014
IPLOG-BSides-DE-2014
 
Enei
EneiEnei
Enei
 
100 M pps on PC.
100 M pps on PC.100 M pps on PC.
100 M pps on PC.
 
Preso fcul
Preso fculPreso fcul
Preso fcul
 
How to dominate a country
How to dominate a countryHow to dominate a country
How to dominate a country
 
PLNOG16: Obsługa 100M pps na platformie PC , Przemysław Frasunek, Paweł Mała...
PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...
PLNOG16: Obsługa 100M pps na platformie PC , Przemysław Frasunek, Paweł Mała...
 
DPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDSDPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDS
 
Linux Network Stack
Linux Network StackLinux Network Stack
Linux Network Stack
 
Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)
 
Security Onion Advance
Security Onion AdvanceSecurity Onion Advance
Security Onion Advance
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDK
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-I
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
 
SMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgiSMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgi
 
How Secure is TCP/IP - A review of Network Protocol
How Secure is TCP/IP - A review of Network ProtocolHow Secure is TCP/IP - A review of Network Protocol
How Secure is TCP/IP - A review of Network Protocol
 
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
 
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageMaster Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS Village
 
Network traffic analysis course
Network traffic analysis courseNetwork traffic analysis course
Network traffic analysis course
 
Rip 2 docoments version 1.1 by deepak kumar
Rip 2 docoments version 1.1 by deepak kumarRip 2 docoments version 1.1 by deepak kumar
Rip 2 docoments version 1.1 by deepak kumar
 
Get rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protectionGet rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protection
 

IPLOG-BSidesROC-2015

  • 1. IPLOG? A beginner's IDS for the WIN!v0.2 IPLOG, provides the beginner sysadmin with actionable network intelligence, without the complexities of more advanced IDS solutions.
  • 2. The purpose of an IDS. Actionable & Timely Intelligence. ● Open Source Solutions – Suricata – TcpDump / Wireshark – SNORT – IPLOG
  • 3. The Problems ● Suricata. – It exists, that's all I know about it. – If you know more about it, be ready for the Q & A! – Next point. :-) ● TcpDump / Wireshark. – Skills ● Can you read a pcap like a book? ● Can you dissect TCP/IP in your head? ● We are at a BSides, maybe some of you can. – Speed ● Can you do all the above at 10 MB/s? ● Actionable? Yes. Timely? No.
  • 4. The Problems Contd SNORT Complexity ● IDS - SNORT has LOTS of options. ● Rule Management. – Which set or sets? ● Community. ● ET. ● VRT. ● Custom. – Which update solution? ● Oinkmaster. ● Pulled Pork.
  • 5. The Problems Contd SNORT Complexity Contd ● Logs - Here comes LOTS of DATA! – Which DB? ● Mysql. ● Postgresql. – SNORT -> DB interface? - Barnyard2 ● A Web APP – Web Server Deployment. – Web App Deployment. – Some Web Apps. ● BASE ● Snorby ● Sguil
  • 6. The Problems Contd SNORT Contd ● Skills – Learn everything just mentioned. – Tune your rule sets to eliminate the noise. ● Speed. – Actionable? Yes. – Timely? Yes. ● After your rule set is tuned. ● After you get current on the logs. :-)
  • 7. A solution, IPLOG. What is IPLOG? ● Open Source Software. ● Written by Ryan McCabe in 2000. ● github.com/NathanGibbs3/iplog ● Simple, but not tcpdump.
  • 8. IPLOG What does it do. ● Connection Logging ● Scan Detection – TCP Port Scans. – TCP SYN Scans. – TCP null Scans. – FIN Scans. – TCP "Xmas" Scans. – UDP Scans. ● Attack Detection – ICMP ping floods. – UDP and ICMP "smurf" attacks. – IP fragment attacks. – Bogus TCP flags. ● NMAP Scan evasion. ( Experimental )
  • 9. IPLOG Logging ● Syslog or text file ● Log Sample Jan 1 00:26:25 TCP: Bogus TCP flags set by 157.55.33.14:28256 (dest port 80) Jan 1 02:24:03 UDP: scan/flood detected [port 500] from 124.126.133.120 [port 500] Jan 1 02:24:10 ICMP: 194.187.150.110 time exceeded (udp: dest port 32887, source port 51413) Jan 1 02:24:44 ICMP: 196.200.48.10 time exceeded (tcp: dest port 63473, source port 47785) Jan 1 02:24:45 ICMP: 196.200.48.10 time exceeded (tcp: dest port 63473, source port 44733) Jan 1 02:25:09 UDP: scan/flood mode expired for 124.126.133.120 - received a total of 36 packets (14616 bytes). Jan 1 02:26:18 ICMP: echo from 129.82.138.44 (12 bytes) Jan 1 02:26:26 ICMP: 194.187.150.110 time exceeded (udp: dest port 51731, source port 51413) Jan 1 02:29:15 last message repeated 1 times Jan 1 02:29:15 TCP: ms-sql-s connection attempt from 115.239.226.51:6000 Jan 1 02:30:26 UDP: dgram to isakmp from 124.126.133.120:500 (412 data bytes) Jan 1 02:30:26 UDP: dgram to isakmp from 124.126.133.120:500 (384 data bytes)
  • 10. IPLOG Misc. ● Can filter out noise. – Config Example. # gtld Name Servers ignore udp from 192.5.6.30 sport 53 ignore udp from 192.12.94.30 sport 53 ignore udp from 192.26.92.30 sport 53 ignore udp from 192.31.80.30 sport 53 ignore udp from 192.33.14.30 sport 53 ignore udp from 192.35.51.30 sport 53 ● A newer version of IPLOG. ( 2.2.5 ) github.com/NathanGibbs3/iplog
  • 11. Contact Information. ● Email: nathan@cmpublishers.com ● Twitter: @Christ_Media ● Linkedin: linkedin.com/in/nategibbs ● Slideshare: slideshare.net/NathanGibbs3 ● GitHub: github.com/NathanGibbs3 ● Web Site: www.cmpublishers.com/oss
  • 12. Thank You! ● Jesus Christ. ● Family & Friends. ● BSides ROC. ● Ryan McCabe.